Subscription to the full report on a daily basis can be obtained:
Send an eMail to dhsdailyadmin@mail.dhs.osis.gov with the subject "DHS Daily Open Source Infrastructure Report" and the following line in the body...subscribe.
To obtain a complete copy of the current report proceed to the DHS link below.
To obtain reports more than 10 business days old, send an eMail to DHS_Reports@e-computer-security.com. Be specific as to the reports you wish to receive.

• The U.S. Environmental Protection Agency
reached a settlement with Wisconsin Power & Light Co. and other utilities
to spend $1.2 billion to clean up coal-fired plants and shut down older plants.
– Milwaukee Journal Sentinel

• A suspect known
as the “Merrimack Valley Bandit,” believed to have robbed a bank in Maine, is
suspected of 13 other robberies in Massachusetts. – North Andover Eagle
TribuneSee
item 7 below in the Banking and Finance Sector

• A nationwide test of the Emergency Alert
System will air April 23 in the first ever case of testing the system. – KRXI
11 Reno

• A man was charged with threatening to use a
weapon of mass destruction, terroristic threats, and risking a catastrophe
after his bomb-related comments caused a bomb scare at a mall in Pittsburgh. – WPIX
11 Pittsburgh

43.
April 22, WPXI 11 Pittsburgh –
(Pennsylvania) Man accused of making bomb threat at South Hills Village mall.
A man was charged with threatening to use a weapon of mass destruction,
terroristic threats, and risking a catastrophe after his bomb-related comments
caused a bomb scare at the South Hills Village mall in Pittsburgh. Several
employees and customers were forced to wait on the outskirts of a parking lot
while the Allegheny County Bomb Squad investigated the man’s bags. Source: http://www.wpxi.com/news/news/south-hills-village-theater-evacuated-after-threat/nXST4/

35. April
23, Help Net Security – (International) Wireless hack attacks
target critical infrastructure. Network control systems for critical infrastructure
are vulnerable to attacks carried out over Software Defined Radio (SDR),
according to Digital Assurance. Proprietary wireless technologies in control
devices may allow network access and networks will grow more vulnerable as more
smart meters are installed. Source: http://www.net-security.org/secworld.php?id=14795

36. April
23, eWeek – (International) Cyber attacks growing more sophisticated,
targeting IT firms. A report by FireEye found several trends in
cyberattacks, including the heavy use of command and control hubs, technology
organizations being among the most common targets, and that most advanced
persistent threat (APT) attacks are in some way associated with Chinese groups.
Source: http://www.eweek.com/small-business/cyber-attacks-growing-more-sophisticated-targeting-it-firms/

38. April
23, Help Net Security – (International) Researchers discover
more BadNews on Google Play. The BadNews malware for Android was again
found in the Google Play store after Google removed other instances of it April
22. The malware steals users’ device information and tricks them into
downloading other malicious apps. Source: http://www.net-security.org/malware_news.php?id=2475

Links

About Me

U.S. Army Retired Chief Warrant Officer with more than 40 years in information technology and 35 years in information security. Became a Certified Information Systems Security Professional in 1995 and have taught computer security in Asia, Canada and the United States. Wrote a computer security column for 5 years in the 1980s titled "for the Sake Of Security", penname R. E. (Bob) Johnston, which was published in Computer Decisions.
Motto: "When entrusted to process, you are obligated to safeguard"